audit in cbs environment - nagpuricai in cbs environment ca abhijit p. sanzgiri. ... finacle...

47
AUDIT IN CBS ENVIRONMENT CA Abhijit P. Sanzgiri

Upload: trankhanh

Post on 14-Jul-2018

222 views

Category:

Documents


3 download

TRANSCRIPT

AUDIT IN CBS

ENVIRONMENT CA Abhijit P. Sanzgiri

Do we know what we do not know

Awareness of Limitations

Understanding of Risks – Controls

Explosion of data handled – speed of handling data –storage capacities –

Desktops to laptops to handhelds –

Do we know what the future has in store –

Connectivity costs have come down significantly

Boom in Digital Economy – payment banks Apps

Banking will flourish – Banks may diminish -

Information aggregation is not a challenge –Information segregation is

CBS – shift from branch to bank Banking

Business Process Reengineering – Bank & not Branch Customer

Allows any branch of a bank to view & update a common

data base in a central server located in the data centre

CBS application software

Network connectivity through VPN (Internet)

Web, application & database servers

Decentralized data processing - centralized storage & backup

Integrates various business channels of the bank

Consolidated view of operations

DRC (Disaster Recovery Centre) in a separate seismic zone

Software Packages

Core banking - Banking service provided by a group of networked bank branches where customers may access their bank account & perform basic transactions from any member branch offices –

Platform where communication technology & information technology merge to suit core needs of banking tailoring products & services for the customer in a proactive way

ANY where Banking – Any Time Banking

Centralized online real time environment

Finacle – Infosys – ICICI / IDBI

Flex Cube – Iflex – Yes Bank / Kotak Mahindra

B@nks 24 – TCS – SBI Group

Omni – Various Co-operative Banks

Management of big data

CRM - 360 degree customer view

Origination of new products & customers

Banking analytics - Risk & Profitability analysis, Capital reserve allocation & collateral management

Banking finance - General ledger & reporting

Banking channels - Teller systems, side counter (sales) applications, mobile banking & online banking solutions

Best practice workflow processes

Content management facilities

Governance & compliance capabilities - Internal controls management & auditing

Security control & audit capabilities

Banking will remain – Banks may not

Big data – 3 V’s - Volume, Variety & velocity (speed)

Scalability of systems – whether legacy architecture can support new technology -

Internet of Things - Way for devices connected to Internet to communicate & share information, real time with other ‘smart’ devices leveraging capabilities of big data, analytics & artificial intelligence to anticipate needs, solve problems & improve efficiency by offering advice, products & solutions helping customers make smart & financially sound decisions

Cloud computing - A type of Internet-based computing where servers, storage and applications are delivered to an organization's computers & devices through the Internet.

SA 315 -

Identifying & assessing risk of material mis-statement through

understanding of an entity & its environment –

Obtaining sufficient understanding of accounting & IC system

Evaluation of inherent & control risk & assessing audit risk

Design & performance of test of controls & substantive procedures

appropriate to meet audit objective

Process to Initiate, process, record, report & correct transactions

Determine flow of transactions & audit trail

SAS 94(AICPA) - Effect of IT in consideration of IC in a FSA

Risks posed by IT to IC –

1)Reliance on systems or programs that inaccurately process

data, process inaccurate data, or both.

2) Unauthorized access to data resulting in destruction of data,

improper changes to data, recording of unauthorized,

nonexistent transactions, inaccurate recording of transactions.

3) Unauthorized changes to data in master files.

4) Unauthorized changes to systems or programs.

5) Failure to make necessary changes to systems or programs.

6) Inappropriate manual intervention.

7) Potential loss of data.

Era of the faceless customer

1. Interest Income & Expense is calculated through the system

2. Multiplicity of delivery systems like ATM / EFT / Internet &

Mobile Banking / Debit & Credit cards

3. Integrity of data moving through data interfaces between

various systems & software

4. Risk of override of controls through privileged access

5. Segregation of duty issues due to access to multiple systems

granted to users

6. Extensive use of 3rd party outsourced vendors in data

processing & management of IT infrastructure

Knowing the right reports

Overall IT policy, Structure & environment

Data processing & data interface under various systems

Data integrity & security

Business Continuity & Disaster recovery

Controls over creation / modification of account heads & codes

MIS reports generated & periodicity thereof

Hard copies generated & periodicity thereof

Exception Reports generated

IT issues noted – resolved / unresolved last year

Customer complaints wt errors in their transactions

Significant observations in system audit reports

Controls

Preventive Controls – prevent the issue from occurring or minimize the probability of the unlawful event from taking place – e.g. Security Controls

Deterrent Controls – punitive measures in policies to deter people from committing unlawful activities

Detective Controls – immediate arrest of damage post detection to minimize the impact

Corrective Controls – help recovery of services / information post the event / disaster – e.g. BCP

Entity level Controls Design & operating effectiveness

Monitoring of Controls

Sensitization & awareness / knowledge of controls

Getting the right reports

Availability of authorized, accurate & complete data for processing

No loss of data in case of interruption of power supply or processing failure

System prevents unauthorized amendments to programs

Appropriate access & authorization rights

Activity log review to test segregation of duties

Authentication of parameter changes at master or user level

Controls on modification of Account Master

Exception reports – generation / verification

Inventory of IT assets – Hardware / Software obsolescence

Input – Output & Processing Controls

Interface – Data integrity & File continuity controls

Issues – handled usually at HO

Email etiquette policy

Email security

LAN / WAN / MAN security

Operating system security

Archived data security

Incidence Management policy – Information Security Officer

Handling of confidential information & security incidents

Privacy issues for outside agencies

Web site security

Persons responsible for implementing security policy & consequence for wilful violation of security Policy

IS audit guidelines

Vendor Selection & management

User manuals & source codes - super users – ID disablement

Audit techniques do not change

All modules of software are implemented

GL codes are duly authorized & used

Tally of GL / subsidiary books

Controls over Passwords

Version Controls

Back up process – Periodicity / Storage / Custody / Retrieval

& testing – Security & location

Use of latest version of anti virus controls

Use of security patches as & when released

Access rights to only authorized personnel

Risks

Transactional or Operational Risk - Processing errors -Frauds -

System disruptions - unanticipated events affecting ability to

deliver products & services – Policies, controls in place to

mitigate risks - Documentation of risks & controls

Credit Risk ( online credit applications, submission of

information & approval of loans - online tracking/ monitoring)

Compliance – Legal Risk ( E-agreements - online

communications – confirmations, Document scanning)

Reputational Risk - Identification of cyber risks - Developing

cyber intelligence - increase in online communications &

transactions, use of social media.

Mobile banking

RBI Master Circular – Mobile Banking transactions in India –July1st, 2015 –

Authentication of MPin

Security framework - Encryption – Maintaining at all times, Confidentiality/ Integrity & availability of data – Controls to ensure there is no tampering of data & interception & change of data – security level controls at service providers

Regulatory compliance – KYC / AML – Transactions up to Rs 5000/- can be facilitated without end to end encryption as per 4th May, 2011 RBI circular

Need for standardization of on boarding of customers for mobile banking – 4th December 2014, RBI circular

Issues

TDS Calculations

NPA identifications & provisioning

Depreciation Workings

Alert generation for suspicious transactions – White Listing

Due date alerts – Minor to Major – Senior citizen date - Expiry

of passport & insurance policy - Limit expiry report - Document

validity & file movements - receipt of stock statements, audited

financials – Computation & updation of draw power - Floating

interest rates – Non renewed accounts - TOD reports –

Flagging dormant accounts & activation - Account Risk Profiling

- Negative balance reports – Cheque Bouncing -

Are these reports readily available

% of cash withdrawals / deposits to total

Account Turnover as a % to Projected Sales – > 40% deviation

> 20% Deviation of stocks - Debtors - Creditors to audited financials & as verified by stock auditors

Number of days account was overdrawn

Number of times TOD granted & time taken to regularize TOD

% of limit utilization to sanctioned limit

Secondary Collateral Value as a % of sanctioned Limit

Date of last valuation / Inspection - Accounts not inspected

Monitoring of audit issues – Open / Closed

Number of days cash balances > Retention limits

Insurance cover as a % to Average stocks held

Dates of changes in Interest rates for Deposits / Advances

Issues

Clearance of suspense accounts – outstanding > 7 days

Debits in Income & credits in expense accounts

Overdue reports – Term loan repayment debits to CC accounts – Policy in last 3 months –

Fund Transfers in/ out related & other accounts

Credits to NRE / FCNR accounts

Monthly listing of Deposit/ Advances – Position on 20th March - 7th April

Issuance & cancellation of inventories - Loose cheque leaves

Capture & control of specimen signatures

Asset Liability Classification Bucket wise

Capital adequacy classification

Error free data migration from one platform to another – No pending unresolved issues –

Root cause / pattern analysis for errors noted – Number analytics

Issues

Interest rate modifications – interest application skipped

Lien marking of FDR

Error reports

Down time registers

Log registers for change in product parameters

Restrictions on usage of Pen drives / CD access

Access to server rooms – Logs

Annual Maintenance Contracts – Due date monitoring

Software Licenses wrt Machines at Branch

Insurance

Fire Extinguishers – Due date of refilling

Day begin & Day end activities – especially day end on 31st March

Audit techniques – don’t change

Inquiry

Confirmation

Observation

Calculation & Re-calculation

Reconciliation

Physical verification & Re-verification

Computation

Performance & Re-performance

Analytical procedures

Reports should be made available

Credits lower than interest debits – need to go through the entire account statements

Rounding offs in overdue reports – 2.9 or 3.1 to 3

Min Max statements – effects of cheque bouncing captured on Day 2 / transfers next day – reversals

PDC issued reducing Creditors

Stock booked on receipt while Creditors booked on receipt of invoices

Debtors booked on average Sales realization

Differences in audited statements / stock statements due to year end adjustments made by auditors

Differences in stock audit figures & borrower submissions due to timing differences – delays in data up-dation –data with CA

Logic used in report compilation is important

Committee Reports

Jilani Committee 1995 – identified various risks associated with IT systems & recommended control measures to address those risks

Burman Committee report on IT security - 24th Dec 2002 classified 5 categories of risks in IS environment & gave a detailed checklist

Gopal Krishna Working Committee report dtd 21st Jan 2011on 9 areas -IT Governance, Information Security, IS Audit, IT Operations, IT Services Outsourcing, Cyber Fraud, Business Continuity Planning, Customer Awareness programmes and Legal issues

High Level Committee for preparation of InformationTechnology Vision Document : 2011-17 – 28th Feb, 2011

Talwar Committee Report - 3rd August 2011 -Chapter on Technology & Customer Service

TRAI – Mobile Banking ( Quality of Service) Regulations, 2012

15 areas – Burman Committee

Business StrategyLong Term IT StrategyShort Range IT PlansIS Security PolicyImplementation of Security Policy

IS Audit GuidelinesAcquisition and Implementation of Packaged SoftwareDevelopment of software - in-house and outsourcedPhysical Access ControlsOperating System ControlsApplication Systems ControlsDatabase controlsNetwork ManagementMaintenanceInternet Banking

International frameworks

COBIT 5 - Control objectives for information and related technology – April 2012 framework of best practices created for IT management & governance by ISACA ( Information Systems Audit & Control Association)

ISO/IEC 27002 – Information Security Standard of ISO ( International Organization for Standardization) - Best practices to initiate, implement, or maintain Information Security management systems (ISMS).

Information security –

Preservation of Confidentiality ensuring that information is accessible only to those authorized to have access)

Integrity (safeguarding the accuracy and completeness of information and processing methods)

Availability (ensuring that authorized users have access to information & associated assets when required)

NIST SP 800 30 framework – Sept 2012

9 step Guidance for conducting risk assessments

Step 1 System Characterization

Step 2 Threat Identification

Step 3 Vulnerability Identification

Step 4 Control Analysis

Step 5 Likelihood Determination

Step 6 Impact Analysis

Step 7 Risk Determination

Step 8 Control Recommendations

Step 9 Results Documentation

Risk Mitigation

Risk Assumption - Accept the potential risk & continue operating the IT system or implement controls to lower the risk to an acceptable level

Risk Avoidance - Avoid the risk by eliminating the risk cause &/or consequence (e.g., forgo certain functions of the system or shut down the system when risks are identified)

Risk Limitation - Limit the risk by implementing controls that minimize adverse impact of a threat’s exercising a vulnerability (e.g., use of supporting, preventive, detective controls)

Risk Planning - Manage risk by developing a risk mitigation plan that prioritizes, implements, & maintains controls

Research & Acknowledgement - Lower risk of loss by acknowledging the vulnerability or flaw & researching controls to correct the vulnerability

Risk Transference - Transfer the risk by using other options to compensate for the loss, say purchase of insurance.

Issues

Multiple customer ID’s – same PAN / Email Id / Address / Phone

Data cleansing – Data purification – SBI Project Ganga

Information Technology Act, 2000

Garbage In – Garbage Out

IT general Controls

VAPT – Vulnerability assessment & penetration testing

Software application is as accurate as it is programmed to be

Data thefts

Frauds

FATCA – CRS

Training / Awareness

Frauds

Hacking or Cracking - illegal intrusion of information in a computer system & or network.

Phishing - acquiring of sensitive information such as user names, passwords or credit card details by masquerading as a trustworthy entity in an electronic communication.

Vishing and Smishing - Phone scams similar to "phishing". Vishing is a telephone call claiming to be from a legitimate company requesting personal information to resolve an urgent financial matter unfortunately the telephone call is phony & you are providing information to a fraudster. Smishing is done through text messages on a cell phone by asking you to call a particular number or click on a link that could contain malicious code & potentially steal information stored in your cell phone without your knowledge.

Data theft - use of hand held devices like flash drives, I pods, digital cameras & ability to transmit large amounts of data quickly vide e-mail, web pages, USB drives, DVD storages & other hand held devices.

Frauds

Impersonation: Imposter obtains key pieces of personal information to impersonate someone else. He

assumes identity of that person to make transactions, purchases, get loans or credits. Done for illegal

immigration, hiding from creditors or people who want to be anonymous for personal reasons. person

whose identity is assumed suffers various consequences as he is held responsible for the perpetrators actions.

Botnets - Networks of compromised computers, controlled by remote attackers to perform illicit tasks as

sending spam or attacking other computers.

Malvertising – Method whereby users download malicious code by simply clicking at some advertisement

on any infected website

Cyber Extortion: Blackmailing the victim & extorting money to stop the DOS attacks or give back the

information stolen or discontinue vandalism. Cyber Terrorism - Warfare: Distributed Denial of service

attacks, hate websites & hate emails, attacks on service network etc. Computer Vandalism is damaging or

destroying data instead of stealing or misusing it. Programs used attach themselves to a file & circulate.

PUPs (Potentially Unwanted Programs) - installs unwanted software in system like search agents, toolbars.

Frauds

E mail spoofing - Sending an email to another person in a way that it appears that the email was sent by someone else. Mail appears to originate from one source but is actually sent from another source.

Denial of Service or DOS attacks flood the bandwidth of the victim’s network or fills his e mail box with spam mail depriving him of service that he is entitled to access or provide.

Dissemination of viruses by use of malicious software that attaches itself to other software. Some common viruses are Virus worms, Trojan horse, Web jacking, Email bombing.

Software piracy Theft or illegal copying of genuine programs or by counterfeiting & distribution of product intended to be passed as originals.

Misuse of Digital Signature: If the private key is not stored securely, it can be misused without knowledge of Private key owner to issue unauthorized digital certificates for cyber espionage, malware diffusion or sabotage.

Man in the Middle Attacks (MITM) - Attacker secretly relays & possibly alters communication between 2 parties who believe they are directly communicating with each other. Attacker intercepts all messages between the 2 victims and injects new ones & in fact controls the entire conversation.

Card Frauds

Use of Debit or Credit cards to obtain goods without paying or obtaining unauthorized funds from an account.

Using fake identities, documentations, impersonation to get genuine cards

Using a stolen or lost Credit card for illegal purchases before the holder notifies the issuing bank & the issuing bank puts a block on the account

Skimming or theft of payment card information used in a legitimate manner by using basic methods like photocopying receipts or advanced methods like using small electronic devices (skimmers) to swipe & store hundreds of victim card numbers.

Tele Phishing is obtaining a list of individuals with their name & phone numbers luring victims into thinking that they are speaking with a trusted organization while handing over sensitive information such as card details.

Card Frauds

A Merchant at a POS (Point of Sale) terminal allowing a fraudster to get goods on a stolen credit card for consideration. Providing details of customer cards to a fraudster for consideration. Conniving with a fraudster & allowing him to substitute the imprinter to collect data, then used to multiply cards.

Swiping of a card by a merchant for a nonexistent transaction & accommodating another by lending money from transaction value received from the paying bank.

Card holder declaring card as stolen or lost to the issuer & soon after use it himself to it’s limits. Loss on the card post intimation is the banker / issuer loss.

Various credit cards are applied simultaneously at the same time by a fraudster with no previous default history & with intent only to use the card to the fullest & not repay or at times agree to an OTS of the dues at a much lesser amount than owed

Conclusion

Are we aware of what is CBS risk

Is the Branch head & staff aware of IT risks

Is there an IT policy in place circulated, read & understood by all –

Are system audit reports available

Is Network configuration diagram available

Is there a Fraud policy

ICOFR – is it known

Please report factually – state extent & manner of

checking done –

Assumption is the mother of all goof ups

Back up slides

Data Centre - A centralized repository for storage, management & dissemination of data & information.

Down Time - Time during which a machine, especially a computer, is out of action or unavailable for use.

Computer or data network is a telecommunications network which allows computers to exchange data.

Network connectivity describes the extensive process of connecting various parts of a network to one another, for example, through the use of routers, switches and gateways, and how that process works.

Server is a computer program or a device that provides functionality for other programs or devices, called "clients

Web application (Web app) is an application program that is stored on a remote server and delivered over the Internet through a browser interface

Back up slides

Interface is a shared boundary across which 2 separate

components of a computer system exchange information. i.e. say

between software, hardware, peripheral devices, humans &

combinations of these. Touch Screen, a Hardware device can send

& receive data through the interface, while a mouse, microphone

or joystick are one way only

Immediate Payment Service (IMPS) of India started in Nov 2010

offers an instant, 24X7, interbank electronic fund transfer service

through mobile phones. MPIN is a 4-digit code used to

authenticate IMPS transactions

VAPT tools provide a detailed picture of the flaws that exist in an

application & the risks associated with those flaws

Back up slides

ITGC or General Computer Controls (GCC) - Controls, other than application controls relate to the environment within which computer-based application systems are developed, maintained & operated & are applicable to all applications. They ensure proper development & implementation of applications, integrity of program, data files &of computer operations.

Logical access controls over infrastructure, applications, & data.

System development life cycle controls.

Program change management controls.

Data center physical security controls.

System and data backup and recovery controls.

Computer operation controls.

GTAG – IIA

GTAGs are written to address issues related to information technology (IT)

management, control, & security.

GTAG 1: Information Technology Controls

GTAG 2: Change and Patch Management Controls: Critical for

Organizational Success

GTAG 3: Continuous Auditing: Implications for Assurance, Monitoring, and

Risk Assessment

GTAG 4: Management of IT Auditing

GTAG 5: Managing and Auditing Privacy Risks

GTAG 6: Managing and Auditing IT Vulnerabilities

GTAG 7: Information Technology Outsourcing

GTAG 8: Auditing Application Controls

GTAG – IIA

GTAG 9: Identity and Access Management

GTAG 10: Business Continuity Management

GTAG 11: Developing the IT Audit Plan

GTAG 12: Auditing IT Projects

GTAG 13: Fraud Prevention and Detection in the Automated World

GTAG 14: Auditing User-developed Applications

GTAG 15: Information Security Governance

GTAG 16: Data Analysis Technologies

GTAG 17: Auditing IT Governance

Application controls

Controls over input, processing, &output functions

Ensures –

Input data is complete, accurate & valid

Internal processing produces expected results

Processing accomplishes desired tasks

Output reports are protected from disclosure

Include –

Edit tests

Control totals/ Batch balancing

Reconciliation of accounts

Exception handling

Application Controls

Input Controls –

Input Authorization

Batch Controls & Balancing

Error Reporting & Handling

Batch Integrity in Online or Database systems

Processing Controls – Data Validation and Editing Procedures Sequence check - Limit check - Range check - Validity check - Reasonableness check -Table lookups - Existence check - Key verification - Check digit -Completeness check - Duplicate check - Logical Relationship check

Processing Controls

Data File Control Procedures – Parity checking - Transaction logs - Version usage - File up-dation & maintenance authorization

Application controls

Output Controls –

Was the information distributed to the appropriate recipient?

Where was the sensitive report printed?

Was distribution controlled?

How long are sensitive reports retained & stored in a protected environment?

Are they protected from disclosure &confidentiality.

Batch - Quantity required for or produced as the result of one operation

RTO - Amount of time the business can be without the service, without incurring significant risks or significant losses (Point Objective)

RPO - maximum targeted period in which data might be lost from an IT service due to a major incident (Time Objective)

On line Audit Techniques

Systems Control Audit Review File & Embedded Audit Modules (SCARF/EAM) – log created to collect information for subsequent review & analysis

Snapshots give an audit trail like taking a lot of snapshots & placing them end to end to analyze the processing logic of specific programs

Audit hooks for those low complexity tasks which mark questionable or suspicious transactions on real time basis as Red Flags

Integrated Test Facility creates a fictitious entity in a database to process test transactions simultaneously with live input

Continuous and Intermittent Simulation verifies processing of actual transactions to verify with actual client results

Audit Software

Popular software - Audit Control Language (ACL) & IDEA (Interactive Data Extraction and Analysis)

ACL - Data interrogation tool used by auditors to view, explore & analyze data efficiently & cost effectively. ACL enables auditors to access data in diverse formats and on various types of storage devices.

IDEA - Generalized Audit Software which imports a wide range of different types of data files. During the import an IDEA file & its field statistics are created.

New developments

BSCBI (Banking Codes & Standards Bureau of India)

Customer Grievance Cells & Banking Ombudsman

Cheque Truncation system

Banca Assurance

Umbrella Banking

Tablet Banking

RBI - OSMOS returns (offsite monitoring & surveillance)

IDRBT - Institute for Development & Research in Banking

Technology

INFINET – Indian Financial Network

New developments – Go Green

Energy efficient data centers

Low energy consuming computing devices

SaaS - Software as a service solution

New technologies - Cloud computing - VPN - Server &

storage virtualization

LCD monitors rather than CRT monitors

Reduction in paper usage –using emails / attachments

Waste management – reduce, reuse & recycle

Tele commuting – Web conferencing

Duplex Printing / Multi page printing / sleep mode

Success Trains – Failure Complains

People are losing curiosity & the desire to learn &

improve themselves & that in complacency & self

satisfaction lies a low descent into mediocrity.

The more you learn you learn that you still have a

lot to learn – Learn – Unlearn – Relearn -

We can not solve our problems with the same level of

thinking that created them – Albert Einstein

If you want something you have never had, then you

got to do something that you never did